An anonymous asymmetric public key traitor tracing scheme

Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber’s anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously, but anonymity control is provided, i.e., a data supplier can trace traitors. Our scheme is constructed based on an asymmetric public-key traitor tracing scheme with one trustee.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages104-114
Number of pages11
Volume2738
ISBN (Print)3540408088, 9783540408086
DOIs
Publication statusPublished - 2003
Event4th International Conference on E-Commerce and Web Technology, EC-Web 2003 - Prague, Czech Republic
Duration: 2003 Sep 22003 Sep 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2738
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other4th International Conference on E-Commerce and Web Technology, EC-Web 2003
CountryCzech Republic
CityPrague
Period03/9/203/9/5

Fingerprint

Traitor Tracing
Public key
Cryptography
Broadcast Encryption
Anonymity
Privacy
Trace
Traceability
Multimedia
Manufacturing
Electronics
Requirements

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Choi, E. Y., Hwang, J. Y., & Lee, D. H. (2003). An anonymous asymmetric public key traitor tracing scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2738, pp. 104-114). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2738). Springer Verlag. https://doi.org/10.1007/b11826

An anonymous asymmetric public key traitor tracing scheme. / Choi, Eun Young; Hwang, Jung Yeon; Lee, Dong Hoon.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2738 Springer Verlag, 2003. p. 104-114 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2738).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Choi, EY, Hwang, JY & Lee, DH 2003, An anonymous asymmetric public key traitor tracing scheme. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 2738, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2738, Springer Verlag, pp. 104-114, 4th International Conference on E-Commerce and Web Technology, EC-Web 2003, Prague, Czech Republic, 03/9/2. https://doi.org/10.1007/b11826
Choi EY, Hwang JY, Lee DH. An anonymous asymmetric public key traitor tracing scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2738. Springer Verlag. 2003. p. 104-114. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/b11826
Choi, Eun Young ; Hwang, Jung Yeon ; Lee, Dong Hoon. / An anonymous asymmetric public key traitor tracing scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2738 Springer Verlag, 2003. pp. 104-114 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{5b802e88d6994823b21ef369a59c83f6,
title = "An anonymous asymmetric public key traitor tracing scheme",
abstract = "In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber’s anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously, but anonymity control is provided, i.e., a data supplier can trace traitors. Our scheme is constructed based on an asymmetric public-key traitor tracing scheme with one trustee.",
author = "Choi, {Eun Young} and Hwang, {Jung Yeon} and Lee, {Dong Hoon}",
year = "2003",
doi = "10.1007/b11826",
language = "English",
isbn = "3540408088",
volume = "2738",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "104--114",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - An anonymous asymmetric public key traitor tracing scheme

AU - Choi, Eun Young

AU - Hwang, Jung Yeon

AU - Lee, Dong Hoon

PY - 2003

Y1 - 2003

N2 - In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber’s anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously, but anonymity control is provided, i.e., a data supplier can trace traitors. Our scheme is constructed based on an asymmetric public-key traitor tracing scheme with one trustee.

AB - In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber’s anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously, but anonymity control is provided, i.e., a data supplier can trace traitors. Our scheme is constructed based on an asymmetric public-key traitor tracing scheme with one trustee.

UR - http://www.scopus.com/inward/record.url?scp=84955571514&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84955571514&partnerID=8YFLogxK

U2 - 10.1007/b11826

DO - 10.1007/b11826

M3 - Conference contribution

SN - 3540408088

SN - 9783540408086

VL - 2738

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 104

EP - 114

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -